CCMM Applied

Security assessments can look complete
and still miss reality.

CCMM tests what your current assessment assumes

CCMM applies evidence-weighted reasoning to assessment workflows, helping teams evaluate whether controls, policies, inherited dependencies, and boundary assumptions actually hold under pressure.

Applied in IRAP-aligned and standards-based assessment contexts.

Reality Check A system can appear at standard and still become fragile when evidence weakens, scope shifts, or inherited controls are accepted without verification.

Based on desensitised real-world assessment patterns.

Independent analytical framework. Not affiliated with or endorsed by ASD or the IRAP program.

Assessment Pressure Test

A system can look complete on paper
and still fail when one assumption breaks.

Control coverage, inherited trust, and evidence quality are often treated as stable. They are not. When one of them weakens, the assessment outcome can change faster than most reporting models reveal.

CCMM is designed to expose that fragility before it becomes an operational problem.
Interactive Proof

Change the inputs.
Watch the assessment outcome move.

This is where CCMM stops being theory. Adjust evidence strength, boundary confidence, inherited trust, and control performance, then observe how quickly the assessment result changes. The point is not to simulate failure. The point is to reveal fragility before it becomes operational reality.

How to use this section Select a scenario, move one variable at a time, and watch how Gate A integrity, control effectiveness, and residual risk reasoning respond. Small changes should feel consequential.

Step 01

Select a scenario

Start from a desensitised assessment pattern based on realistic evidence, scope, and inherited-control conditions.

Step 02

Stress one assumption

Reduce evidence weight, weaken coverage, or challenge shared-responsibility confidence to see whether the result still holds.

Step 03

Observe the shift

Track how the qualitative outcome, weighted score, and rationale change when the supporting conditions stop behaving as assumed.

Next: the interactive scenarios section below is the proof layer. It shows how a passing-looking assessment can become fragile when one input moves.
Open Scenarios
Three Ways In

Enter the problem from the angle that matters most to you.
Missing evidence. Fragile outcomes. Untested assumptions.

These are not three different products. They are three different ways to understand the same issue: an assessment result can look stable until one supporting condition is challenged.

Entry 01

See What
Your Assessment Missed

Most assessments confirm that controls are present. Few expose what was missed, assumed, or inherited without verification.

Why this matters

One missing artefact can materially alter the confidence of an entire control conclusion.

See What Was Missed
Entry 02

Stress-Test
Your Assessment

A passing assessment is a snapshot. CCMM shows how resilient that result remains when evidence weight, coverage, or inherited trust begin to move.

Why this matters

A system can meet assessment expectations and still become fragile under real operational conditions.

Stress-Test the Result
Entry 03

Challenge
Your Security Assumptions

Every assessment depends on assumptions about scope, control effectiveness, and evidence reliability. CCMM tests those assumptions instead of accepting them.

Why this matters

If one assumption fails, the entire risk model can change faster than most reporting structures reveal.

Challenge Assumptions

Based on desensitised assessment patterns and framed for decision-support use in IRAP-aligned and standards-based assessment contexts.

Interactive Proof

Adjust one input.
Watch the assessment break.

Select a scenario, then move the sliders. Evidence weight, boundary coverage, control effectiveness, and rationale traceability determine whether an assessment holds or fails. Observe how quickly the outcome shifts when one assumption moves.

Simulation Disclaimer

The government agency and department names used in the following scenarios are real names used for contextual realism only. All scenarios, scores, findings, and outcomes are entirely simulated constructs designed to illustrate how the CCMM methodology operates in IRAP and ISM-aligned assessment contexts. They do not represent actual assessment findings, authorisation outcomes, or security postures for any named agency, department, or system. GABEY Consulting Pty Ltd holds no affiliation with, and has not been engaged by, the named agencies in connection with these scenarios.

Fixed dimensions (scenario context)
NL-IRAP-1Loading...
Gate A — Assessment Integrity
Loading...
CASS Score
Loading...
Change from Baseline
Why CCMM is Different

Frameworks define what should exist.
CCMM evaluates whether it actually holds.

Traditional assessment approaches focus on completeness and presence. CCMM focuses on evidence strength, assumption testing, and how outcomes behave when conditions change.

Traditional Assessment Approach

Confirms that controls exist
Relies on static evidence
Treats inherited controls as given
Produces a point-in-time result
Can hide fragility behind completeness

CCMM Approach

Weights evidence strength
Tests control effectiveness under change
Challenges inherited assumptions
Updates conclusions as inputs move
Produces traceable reasoning, not just results
Standards Overlay

One reasoning layer.
Multiple standards and assurance contexts.

CCMM is not a replacement for existing frameworks. It sits above them as an evidence-weighted analytical layer, helping teams evaluate whether controls, policies, and procedures appear effective in practice rather than merely present on paper.

Positioning Frameworks define requirements. CCMM helps test how strongly those requirements appear to hold when evidence, boundaries, inheritance, and control assumptions are examined under pressure.

IRAP

IRAP Context

Supports assessment reasoning around evidence quality, scope integrity, inherited controls, and residual risk in IRAP-aligned engagements.

Assessment support layer
ISM

ISM

Helps evaluate whether implemented security controls appear to be operating effectively, not simply documented as present.

Control-effectiveness lens
E8

Essential Eight

Pressure-tests maturity assumptions by examining whether mitigation claims are supported by sufficient and reliable evidence.

Maturity-pressure layer
NIST

NIST

Adds an evidence-weighted reasoning layer over capability and control models, helping teams distinguish stated posture from demonstrated posture.

Reasoning overlay
ISO

ISO 27001

Useful where policy and process exist but assurance leaders need to test whether the system of control appears credible under real operational conditions.

Operational credibility layer
PCI

PCI DSS

Helps examine whether control evidence and segmentation claims appear strong enough to support the intended compliance and risk-reduction outcomes.

Evidence-strength overlay
Interactive Case Engine

Explore desensitised assessment patterns.
Switch between IRAP and ISM reasoning modes.

This engine uses realistic, desensitised assessment patterns derived from mature but imperfect environments. IRAP mode focuses on assessment defensibility. ISM mode focuses on control intent and operational effectiveness.

Scenario

Live Output
78
/ 100 confidence
At Standard

Pressure Variables
Current Interpretation

Use: move one variable at a time and watch how posture shifts when evidence, inheritance, enforcement, or scope confidence changes.

Return to Overlay
Desensitised Case Patterns

Built from realistic assessment conditions.
Not hypothetical theatre.

These patterns are derived from desensitised assessment material showing mature environments that still contain inherited uncertainty, accepted deviations, alternate-control dependence, and boundary-driven weakness.

Why this matters The strongest assessment environments are not perfect. They are governed, documented, and monitored — yet still carry specific weaknesses that only become visible when evidence, inheritance, or scope assumptions are pressure-tested.

Pattern 01

Inherited Control Confidence

Provider controls appear effective, but direct visibility is limited. The assessment position may still weaken if inheritance confidence outruns evidentiary visibility.

What CCMM exposes

The gap between inherited assurance and directly defensible confidence.

Pattern 02

Boundary Exclusion Risk

Important dependencies sit outside formal scope, yet still influence the real posture. A clean boundary statement can still hide operationally material exclusions.

What CCMM exposes

Where scope discipline stops and hidden operational dependency begins.

Pattern 03

Business-Driven Deviation

A control is not fully enforced because of customer experience, operational flexibility, or platform limitation. The governance may be mature, but the residual exposure remains real.

What CCMM exposes

The difference between a documented decision and a genuinely strong outcome.

Pattern 04

Alternate Control Substitution

The primary control is absent, but another measure is claimed to reduce the same risk. The real question is whether the substitute is truly equivalent or merely acceptable.

What CCMM exposes

Whether alternate-control logic is evidence-backed or convenience-backed.

Pattern 05

Inherited Cryptographic Weakness

The environment is mature overall, yet inherited platform settings still allow weaker cryptographic conditions than intended. This is where strong architecture can still carry weak edges.

What CCMM exposes

The tension between acceptable risk management and genuine technical strength.

Pattern 06

Remote Administration Context

Administrative controls are technically strong, but the operating model still depends on remote environments and human discipline. That means environmental confidence becomes part of the posture.

What CCMM exposes

How non-technical context can materially affect technical assurance.

Self-Hosted / High-Security Deployment

Built for environments where assessment data
must remain under direct organisational control.

CCMM is designed for self-hosted deployment in sensitive environments where evidence artefacts, reasoning outputs, and assessment packs cannot be exposed to shared cloud platforms. The design intent is local control, strong cryptographic protection, and minimal external dependency.

Deployment posture Designed for self-hosted operation where assessment materials may include Protected, Secret, or Top Secret-adjacent handling requirements and where external data transfer is itself a security event.

Self-Hosted by Design

Runs within controlled infrastructure so assessment artefacts, scenario data, and reasoning outputs remain inside the organisation’s own security boundary.

No Shared Cloud Dependency

The operating model is built around controlled deployment, not multi-tenant cloud exposure, when assurance data sensitivity makes that unacceptable.

Strong Cryptographic Protection

Assessment data, outputs, and stored artefacts are intended to be protected with strong contemporary cryptographic controls for data at rest and in transit.

Migration-Ready Security Architecture

The design direction supports advanced cryptographic evolution, including post-quantum-resilient approaches where organisational policy or future operating conditions require them.

Practical message: this is not positioned as lightweight SaaS for general-purpose compliance work. It is positioned as a controlled analytical capability for sensitive assurance environments.
Next Step

If the assessment result matters,
the assumptions behind it should be tested.

CCMM is not positioned as a generic tool. It is designed for environments where assessment defensibility, control effectiveness, and evidence strength must be understood with precision.

Discuss Deployment

Explore how CCMM can be deployed in a controlled, self-hosted environment aligned to your security posture.

Walk Through Scenarios

Review desensitised IRAP and ISM-aligned scenarios and observe how outcomes shift under different assumptions.

Apply to Your Context

Map your own environment against CCMM reasoning patterns to identify where hidden fragility may exist.

Initiate Discussion
Controlled engagement • No generic sign-up
Positioning: CCMM is intended for security leaders, assessors, and organisations operating in environments where assessment outputs influence real operational and regulatory decisions.
Engagement Basis

One engagement.
Complete architectural coverage.

CCMM engagements are scoped by project, not by time and materials. A project may be a single application, a solution, or an initiative. Where environments are complex, scope is determined by segments, nodes, and integration depth.

Scope basis: A single project encompasses an application, solution, or initiative as the primary unit. For distributed or complex environments, scope is determined by the number of independently assessable segments or nodes, the depth of integration dependencies, and the classification tier of information processed. All engagements are scoped in consultation prior to commitment. All pricing is in Australian Dollars (AUD) inclusive of GST where applicable.
Foundation
Single Application

Suitable for a single application, solution, or low-complexity initiative with a well-defined boundary, limited integration dependencies, and a straightforward control surface. Typical engagement for an OFFICIAL or OFFICIAL:Sensitive platform.

1 to 3 assessable nodes
from$8,000AUD
Minimum engagement threshold. Final scope confirmed in consultation.
Discuss Foundation
Standard
Multi-Segment

Suited to environments with multiple integration dependencies, inherited control claims, shared responsibility models, or cross-boundary data flows. Typical engagement for PROTECTED-classified platforms or multi-tenant SaaS architectures.

4 to 12 assessable nodes
from$40,000AUD
Scales with node count, classification tier, and integration depth.
Discuss Standard
Complex Ecosystem
Enterprise Platform

Designed for SAP ecosystems, whole-of-enterprise platforms, large distributed architectures, or multi-cloud environments where assessment scope spans 13 or more independently assessable nodes across multiple classification zones or regulatory boundaries.

13 or more assessable nodes
fromContactAUD
Discuss Ecosystem

Included in every engagement

Regardless of tier, every CCMM engagement delivers the same foundational commitment.

CCMM assessment report with full evidence-label discipline. Every finding carries [OF], [CC], [RC], or [AA] labels from first draft. No unlabelled claims are published.
Framework alignment guarantee. All outputs are aligned to ISM, IRAP, Essential Eight, and applicable Australian regulations. Alignment is a condition of delivery, not an aspiration.
All missing architectural artefacts identified and supplied by GABEY. Where artefacts are absent, GABEY produces them. The engagement does not conclude with a list of gaps that remain your problem.
Engage once. GABEY closes the gaps. Identified architectural, procedural, or documentation gaps are remediated within the engagement scope. You do not return for a second engagement to fix what the first one found.
Implementation by GABEY Consulting at nominal cost. Where development is required to close an identified gap, GABEY delivers it. Implementation is not billed at engagement rate. It is built into the engagement commitment.
All development delivered to applicable Australian Standards and regulations. Every artefact, procedure, and implementation output produced by GABEY during the engagement is designed to meet the Standards applicable to your environment and classification tier.
The GABEY commitment: Assessment, gap identification, artefact supply, and remediation are a single engagement. You engage once and receive a defensible, framework-aligned result. The gaps we identify are gaps we close.
Intellectual Property and Protection Statement
GABEY Consulting Pty Ltd (ACN 121 511 055) — all rights reserved
CCMM Proprietary Methodology

The Conditional Consequence Mapping Methodology (CCMM) is a proprietary analytical framework developed by GABEY Consulting Pty Ltd. This includes the CASS scoring architecture, Gate A integrity conditions, non-linear adjustment rules (NL-IRAP-1, NL-ISM-1), dimension weight matrices, evidence-labelling protocol ([OF] / [CC] / [RC] / [AA]), and all associated analytical constructs. The methodology is published under SSRN Abstract ID 6364078 and Zenodo DOI 10.5281/zenodo.19382186. Publication for academic and prior-art purposes does not constitute a licence to reproduce, apply commercially, or derive from the methodology without written authorisation from GABEY Consulting Pty Ltd.

Techniques and Analytical Components

The following CCMM-specific techniques and constructs are owned by GABEY Consulting Pty Ltd: CASS (Composite Assessment Strength Score) formula and weighting architecture; Gate A multi-condition integrity framework; NL-IRAP-1 and NL-ISM-1 non-linear penalty rules; probabilistic scenario tree modelling applied to control-effectiveness assessment; conditional consequence mapping applied to evidence-weight reasoning; and the seven-dimension IRAP and ISM scoring profiles including ACS, EWS, CES, SCI, IHS, RTS, and RRS. These constructs are not reproduced, derived, or implemented by third parties without a formal written licence.

Reverse Engineering Protection

Reverse engineering, extraction, reconstruction, derivation, or reproduction of the CCMM methodology or any of its components — including but not limited to the CASS scoring formula, Gate A integrity thresholds, non-linear penalty parameters, dimension weight matrices, evidence-labelling protocol, or analytical framework structure — from any demonstration, published output, engagement artefact, assessment report, website content, or interactive tool produced by GABEY Consulting Pty Ltd is expressly prohibited without prior written authorisation. This prohibition applies regardless of the medium from which the material is sourced and regardless of whether the material is accessed through a paid or unpaid engagement. Unauthorised reproduction or derivation of the CCMM methodology or its components may constitute infringement of intellectual property rights under the Copyright Act 1968 (Cth) and applicable Australian common law. GABEY Consulting Pty Ltd reserves all rights to pursue remedies available under Australian law.

Engagement Output Ownership

Assessment reports, artefacts, and implementation outputs produced by GABEY Consulting Pty Ltd during an engagement are licensed to the client for use within the stated engagement scope. The underlying CCMM methodology, scoring models, and analytical constructs remain the sole property of GABEY Consulting Pty Ltd. Clients do not acquire any right to reproduce, sublicence, or commercially deploy the CCMM methodology through the receipt of engagement outputs.

All engagements are open to discussion.

Scope, pricing, phasing, and delivery model are confirmed in consultation before any commitment is made. Contact GABEY to discuss your specific environment, classification tier, and requirements.

Initiate Discussion